× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 04bcd98435fdb0739b2e839d36ebf9ab91c8d600a3d8186bce85a4517c6aa6c5
File name: 04BCD98435FDB0739B2E839D36EBF9AB91C8D600A3D8186BCE85A4517C6AA6C5
Detection ratio: 7 / 56
Analysis date: 2018-12-24 16:04:49 UTC ( 1 month, 3 weeks ago ) View latest
Antivirus Result Update
Avast ELF:Mirai-GG [Trj] 20181224
AVG ELF:Mirai-GG [Trj] 20181224
DrWeb Linux.Mirai.60 20181224
ESET-NOD32 a variant of Linux/Mirai.AT 20181224
Jiangmin Backdoor.Linux.bhoq 20181224
Kaspersky HEUR:Backdoor.Linux.Mirai.ba 20181224
ZoneAlarm by Check Point HEUR:Backdoor.Linux.Mirai.ba 20181224
Acronis 20181224
Ad-Aware 20181224
AegisLab 20181224
AhnLab-V3 20181224
Alibaba 20180921
ALYac 20181224
Antiy-AVL 20181223
Arcabit 20181224
Avast-Mobile 20181224
Avira (no cloud) 20181224
Baidu 20181207
BitDefender 20181224
Bkav 20181224
CAT-QuickHeal 20181224
ClamAV 20181224
CMC 20181223
Comodo 20181224
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181224
Cyren 20181224
eGambit 20181224
Emsisoft 20181224
Endgame 20181108
F-Prot 20181224
F-Secure 20181224
Fortinet 20181224
GData 20181224
Ikarus 20181224
Sophos ML 20181128
K7AntiVirus 20181224
K7GW 20181224
Kingsoft 20181224
Malwarebytes 20181224
MAX 20181224
McAfee 20181224
McAfee-GW-Edition 20181224
Microsoft 20181224
eScan 20181224
NANO-Antivirus 20181224
Palo Alto Networks (Known Signatures) 20181224
Panda 20181224
Qihoo-360 20181224
Rising 20181224
SentinelOne (Static ML) 20181223
Sophos AV 20181224
SUPERAntiSpyware 20181220
Symantec 20181224
Symantec Mobile Insight 20181215
TACHYON 20181224
Tencent 20181224
TheHacker 20181220
TotalDefense 20181223
Trapmine 20181205
TrendMicro 20181224
TrendMicro-HouseCall 20181224
Trustlook 20181224
VBA32 20181222
ViRobot 20181224
Webroot 20181224
Yandex 20181223
Zillya 20181222
Zoner 20181224
The file being studied is an ELF! More specifically, it is a EXEC (Executable file) ELF for Unix systems running on <unknown> machines.
ELF Header
Class ELF32
Data 2's complement, big endian
Header version 1 (current)
OS ABI UNIX - Linux
ABI version 0
Object file type EXEC (Executable file)
Required architecture <unknown>
Object file version 0x1
Program headers 3
Section headers 0
Packers identified
upx
ELF Segments
Segment without sections
Segment without sections
Segment without sections
ExifTool file metadata
MIMEType
application/octet-stream

CPUByteOrder
Big endian

CPUArchitecture
32 bit

FileType
ELF executable

ObjectFileType
Executable file

CPUType
PowerPC

Execution parents
File identification
MD5 5d5e7cb5e0963d3701211c9214d55d89
SHA1 c6273c569fc875e58930c6c34a54d72f5c3dd905
SHA256 04bcd98435fdb0739b2e839d36ebf9ab91c8d600a3d8186bce85a4517c6aa6c5
ssdeep
384:b+RfTcxmYYM5tHAF75G2njSKAGyEtQ4vHewKFYmCd73elp1nxUixM2uXUM4uVcqo:oQnYM5tQ5ZSJ0WK/KF1d1nxLm4uVcqgl

File size 21.8 KB ( 22352 bytes )
File type ELF
Magic literal
ELF 32-bit MSB executable, PowerPC or cisco 4500, version 1 (GNU/Linux), statically linked, stripped

TrID ELF Executable and Linkable format (Linux) (50.1%)
ELF Executable and Linkable format (generic) (49.8%)
Tags
elf upx

VirusTotal metadata
First submission 2018-12-24 16:04:46 UTC ( 1 month, 3 weeks ago )
Last submission 2018-12-30 19:18:34 UTC ( 1 month, 2 weeks ago )
File names 23
251
20
hoho.ppc
198
42
5
121
hoho.ppc
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!